PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
History

Thu, 11 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Popojicms
Popojicms popojicms
Vendors & Products Popojicms
Popojicms popojicms

Wed, 10 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
Description PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
Title PopojiCMS 2.0.1 Remote Command Execution via Authenticated Metadata Settings
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-10T21:15:07.958Z

Updated: 2025-12-11T15:42:27.502Z

Reserved: 2025-12-10T14:35:24.455Z

Link: CVE-2024-58284

cve-icon Vulnrichment

Updated: 2025-12-11T15:42:19.572Z

cve-icon NVD

Status : Received

Published: 2025-12-10T22:16:20.420

Modified: 2025-12-11T16:16:21.663

Link: CVE-2024-58284

cve-icon Redhat

No data.